About your Search

20130416
20130424
Search Results 0 to 4 of about 5
, tools and technologies. war the, what are the best technologies we can use for both prevention and te -- detection. secondly, on the issue of information sharing, what are the things we need to do to improve the information sharing flow between government and industry, and that is a focus of our discussions with the various agencies who we deal with. and thirdly, very important for us is response and recovery. again, we build a lot of redundancy and resiliency in the system. we do recovery pretty well like hurricane sandy. we brought 67,000 crews from all over the country to help get the system back on. but cyber is somewhat different. and so we're working very, very diligently on a response and recovery plan. so if there is an outage, if there is caused by cybersecurity, we can come back quickly. >> but, again, the question really is th oama administration and mnyate democrats have maintained the implementation of standards even if they are baselines for critical infrastructure sectors would compel better behavior. have you seen that in the electric industry that that the establishme
personnel along our borders as well as utilization of proven surveillance technology along the highest traffic areas across the southwest border. reducing wait times at the ports of entry the budget requests 35rks00 port officers. to scurel maritime borders the budget invests in coast guard assets, including the seven national security cutter and fast response cutters. the bum continues the department's focus on smart enforcement of our country's immigration laws. it supports the administration's effort to focus the enforcement system on safety threats and the integrity of the immigration system through childhood arrivals and greater use of rosecutor yull discretion. we support more cost effective initiatives of secure communities. e budget invests in monitory compliance to work sight related laws. while continuing to support alternatives to the tension, detention reform and immigrant immigration efforts. comprehensive immigration reform will help us build on these efforts and strengthen boarder security by enabling d.h.s. while focusing on criminals, human smallingers and those who im
strategy that combines personnel, the ground, and technology like drones to monitor the border. as far as interior enforcement, there will put in place a mandatory employment verification system, e-verify. and assistant to make sure e- verify is manageable and for employers and fraud-proof, to make sure people cannot make up social security numbers or work off stolen social security numbers. host: the gang of eight spoke yesterday on capitol hill. fourrepublicans and democrats. lindsey graham of south carolina addressed concerns that he has heard from his peers about the pathway to citizenship. [video clip] >> learn the language, as a civics exams, pay a fine, work, pass a criminal background check, half of my family would be excluded. this is no easy task. [laughter] i'm glad we are not applying it to ourselves. knowope is that america i is ready for immigration reform. you look at all the polls. if the congress ready to do something that we should have done a long time ago? i really believe we are. if you think the border can be better secured, we have an idea for you to consider. if
to have more flexibility in the times of services we provide. technology is going to transform the mail industry in a lot of new and exciting ways and we need to support that speed-up in the transformation. it's not hard to imagine that customers' expectations are going to change dramatically in the coming years. they already have been. customers' tastes are changing. imagine being able to use your smart phone to redirect your male and packages. having them clevered to a current location you're at right now. imagine being able to use a mobile a.m. that has the ability to display what you're going to get in your mailbox over the next few days. that's going to create opportunities for marketers. when you think about all the emails and messages you get today, the mail is the one blast last place where you can get a surprise and there's a lot of peapings you can build around that. imagine if you were to get a notification the moment that your packages and your mail were delivered to your door. imagine if the mail carrier technology enabled so was half a piece of male on a smart phone and n
records are prime targets for attackers to steal. according to the information technology industry council, 18 adults become victims to cybercrime, including identity campaigns ishing every second. this adds up to 1 1/2 million cybercrime victims each day. cyberattacks present a very real and dangerous threat to the united states, however the government currently
Search Results 0 to 4 of about 5